37 min

Threat Hunting and Incident Response Ask A CISO

    • Technology

We speak to Harlan Carvey, Senior Incident Responder in R&D at Huntress, to understand what threat hunting is, and even learn how surprisingly easy it is to tell if an account has been compromised! Harlan and host Jeremy also explore the claim that there's a lack of cybersecurity talents and whether organizations should have an organic incident response, outsource the function to managed service providers, or adopt an approach that combines both choices.

Learn about:

👉 What is threat hunting?
👉 How to tell the difference between legitimate vs illegitimate access?
👉 Differences between Digital Forensics, Threat Hunting, and Incident Response
👉 The Threat Hunting and Incident Response process
👉 Is Windows still the most targeted system by threat actors?
👉 Is there really a shortage of cybersecurity talent?
👉 Should your organization have an organic security team or employ managed services for Threat Hunting and DFIR?

The Ask A CISO podcast is a production of Horangi Cyber Security, Asia's leading cloud security provider. The show is hosted weekly by cofounder and CEO, Paul Hadjy.

-- Show Notes and Transcript --
https://www.horangi.com/blog/threat-hunting-incident-response

-- About Horangi Cybersecurity --
More information about the Ask A CISO podcast: https://www.horangi.com/resources/ask-a-ciso-podcast
About Horangi Cyber Security: https://www.horangi.com

--- About the Guest --
Harlan's LinkedIn: https://www.linkedin.com/in/harlan-carvey-86a8694b/

-- Attributions --
Ending Music: “I Dunno” by Grapes http://ccmixter.org/files/grapes/16626
Creative Commons — Attribution 3.0 Unported— CC BY 3.0
Free Download / Stream: https://bit.ly/i-dunno-grapes
Music promoted by Audio Library https://youtu.be/sNAE8-mB5lQWe

We speak to Harlan Carvey, Senior Incident Responder in R&D at Huntress, to understand what threat hunting is, and even learn how surprisingly easy it is to tell if an account has been compromised! Harlan and host Jeremy also explore the claim that there's a lack of cybersecurity talents and whether organizations should have an organic incident response, outsource the function to managed service providers, or adopt an approach that combines both choices.

Learn about:

👉 What is threat hunting?
👉 How to tell the difference between legitimate vs illegitimate access?
👉 Differences between Digital Forensics, Threat Hunting, and Incident Response
👉 The Threat Hunting and Incident Response process
👉 Is Windows still the most targeted system by threat actors?
👉 Is there really a shortage of cybersecurity talent?
👉 Should your organization have an organic security team or employ managed services for Threat Hunting and DFIR?

The Ask A CISO podcast is a production of Horangi Cyber Security, Asia's leading cloud security provider. The show is hosted weekly by cofounder and CEO, Paul Hadjy.

-- Show Notes and Transcript --
https://www.horangi.com/blog/threat-hunting-incident-response

-- About Horangi Cybersecurity --
More information about the Ask A CISO podcast: https://www.horangi.com/resources/ask-a-ciso-podcast
About Horangi Cyber Security: https://www.horangi.com

--- About the Guest --
Harlan's LinkedIn: https://www.linkedin.com/in/harlan-carvey-86a8694b/

-- Attributions --
Ending Music: “I Dunno” by Grapes http://ccmixter.org/files/grapes/16626
Creative Commons — Attribution 3.0 Unported— CC BY 3.0
Free Download / Stream: https://bit.ly/i-dunno-grapes
Music promoted by Audio Library https://youtu.be/sNAE8-mB5lQWe

37 min

Top Podcasts In Technology

Trane Technologies
Jason Calacanis
Lex Fridman
The New York Times
NPR
Ben Gilbert and David Rosenthal